Save Time & improve Grades
- Questions Asked
- Experts
- Total Answered
Start Excelling in your courses, Ask an Expert and get answers for your homework and assignments!!
use of retina scanning as a biometric authentication method 1. The use of retina scanning as a biometric authentication method has not gained favor because: a. It is inconvenient to use retina scanning in a darkened room b. Many users cannot hold their eye open long enough for a scan to complete c. Users are uncomfortable holding their eye very near the biometric scanning device d. The human retina changes significantly over time 2. Voice recognition as a biometric authentication method is difficult to measure because: a. Many factors, including current health and respiration rate, make sampling difficult b. Computers are not yet fast enough to adequately sample a voice print c. Voice recognition does not handle accents well d. Impatience changes voice patterns, which leads to increased False Reject Rates 3. Which of the following statements about Crossover Error Rate (CER) is true: a. This is the point where the False Accept Rate falls below 50% b. This is the point where the False Reject Rate falls below 50% c. This is the point where False Reject Rate and False Accept Rate add to 100% d. This is the point where False Reject Rate and False Accept Rate are equal 4. A security engineer has recently installed a biometric system, and needs to tune it. Currently the biometric system is rejecting too many valid, registered users. What adjustment does the security engineer need to make? a. Increase the False Accept Rate b. Reduce the False Accept Rate c. Increase the False Reject Rate d. Reduce the False Reject Rate 5. A security engineer is soliciting bids for a software product that will perform centralized authentication. The engineer has found two products so far: one that is based on LDAP and one that is based on TACACS. Which of the following statements is the best approach? a. Select the LDAP-based product b. Do not consider the TACACS-based product, consider the LDAPbased product, and continue looking for other products c. Select the TACACS-based product d. Consider the TACACS-based product, and continue looking for other products based on TACACS Computer Science Assignment Help, Computer Science Homework help, Computer Science Study Help, Computer Science Course Help
Ask a question
Experts are online
Answers (1)
use of retina scanning as a biometric authentication method
Answer Attachments
1 attachments —